Securing the Internet of Things with Responsive Artificial Immune Systems

被引:20
|
作者
Greensmith, Julie [1 ]
机构
[1] Univ Nottingham, Sch Comp Sci, Nottingham NG8 1BB, England
来源
GECCO'15: PROCEEDINGS OF THE 2015 GENETIC AND EVOLUTIONARY COMPUTATION CONFERENCE | 2015年
关键词
Artificial Immune Systems; Internet of Things; Automated Responses; Security; Dendritic Cell Algorithm;
D O I
10.1145/2739480.2754816
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The Internet of Things is a network of 'smart' objects, transforming everyday objects into entities which can measure, sense and understand their environment. The devices are uniquely identifiable, rely on near field connectivity, often in embedded devices. The Internet of Things is designed to be deployed without human intervention or interaction. One application is the 'smart house', with components including household appliances, networked with the user able to control devices remotely. However, the security inherent in these systems is added as somewhat of an afterthought. One hypothetical scenario is where a malicious party could exploit this technology with potentially disastrous consequences, turning on a cooker remotely leading to digital arson. Reliance on standard methods is insufficient to provide the user with adequate levels of security, an area where AIS may be extremely useful. There are currently limitations with AIS applied in security, focussing on detection without providing automatic responses. This problem provides an opportunity to advance AIS in providing both an ideal scenario for testing their real-world application and to develop novel responsive AIS. A responsive version of the deterministic Dendritic Cell Algorithm will be proposed to demonstrate how responsive AIS will need to be developed to meet these future challenges through proposing the incorporation of a model of T-cell responses.
引用
收藏
页码:113 / 120
页数:8
相关论文
共 50 条
  • [1] Securing the internet of things
    Lowne, Alan, 1600, Omeda (58):
  • [2] Securing the Internet of Things in Artificial Intelligence Era: A Comprehensive Survey
    Humayun, Mamoona
    Tariq, Noshina
    Alfayad, Majed
    Zakwan, Muhammad
    Alwakid, Ghadah
    Assiri, Mohammed
    IEEE ACCESS, 2024, 12 : 25469 - 25490
  • [3] Securing the Internet of Things
    Roman, Rodrigo
    Najera, Pablo
    Lopez, Javier
    COMPUTER, 2011, 44 (09) : 51 - 58
  • [4] Securing Data Provenance in Internet of Things (IoT) Systems
    Baracaldo, Nathalie
    Bathen, Luis Angel D.
    Ozugha, Roqeeb O.
    Engel, Robert
    Tata, Samir
    Ludwig, Heiko
    SERVICE-ORIENTED COMPUTING - ICSOC 2016 WORKSHOPS, 2017, 10380 : 92 - 98
  • [5] Securing Things in the Healthcare Internet of Things
    MacDermott, Aine
    Kendrick, Phillip
    Idowu, Ibrahim
    Ashall, Mal
    Shi, Qi
    2019 GLOBAL IOT SUMMIT (GIOTS), 2019,
  • [6] Securing the Internet of Things (IoT)
    El bekkali, Abla
    Boulmalf, Mohammed
    Essaaidi, Mohammad
    Mezzour, Ghita
    2018 6TH INTERNATIONAL CONFERENCE ON WIRELESS NETWORKS AND MOBILE COMMUNICATIONS (WINCOM), 2018, : 211 - 216
  • [7] Challenges to Securing the Internet of Things
    Stout, William M. S.
    Urias, Vincent E.
    2016 IEEE INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY (ICCST), 2016, : 1 - 8
  • [8] Securing Internet-of-Things
    Gong, Guang
    FOUNDATIONS AND PRACTICE OF SECURITY, FPS 2018, 2019, 11358 : 3 - 16
  • [9] SIoT: Securing Internet of Things through distributed systems analysis
    Teixeira, Fernando A.
    Pereira, Fernando M. Q.
    Wong, Hao-Chi
    Nogueira, Jose M. S.
    Oliveira, Leonardo B.
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2019, 92 : 1172 - 1186
  • [10] Securing internet of medical things systems: Limitations, issues and recommendations
    Yaacoub, Jean-Paul A.
    Noura, Mohamad
    Noura, Hassan N.
    Salman, Ola
    Yaacoub, Elias
    Couturier, Raphael
    Chehab, Ali
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2020, 105 : 581 - 606